Journal ArticleDOI
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
TLDR
This article provides a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system that can withstand collusion attack performed by revoked users cooperating with existing users and proves the security of the scheme under the divisible computation Diffie-Hellman assumption.Abstract:
With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed and used in cloud storage system. However, user revocation is the primary issue in ABE schemes. In this article, we provide a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system. The issue of user revocation can be solved efficiently by introducing the concept of user group. When any user leaves, the group manager will update users’ private keys except for those who have been revoked. Additionally, CP-ABE scheme has heavy computation cost, as it grows linearly with the complexity for the access structure. To reduce the computation cost, we outsource high computation load to cloud service providers without leaking file content and secret keys. Notably, our scheme can withstand collusion attack performed by revoked users cooperating with existing users. We prove the security of our scheme under the divisible computation Diffie-Hellman assumption. The result of our experiment shows computation cost for local devices is relatively low and can be constant. Our scheme is suitable for resource constrained devices.read more
Citations
More filters
Journal ArticleDOI
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage
TL;DR: This work formalizes the definition and security model, which model collusion attack executed by the existing users cooperating with the revoked users, and presents a user collusion avoidance ciphertext-policy ABE scheme with efficient attribute revocation for the cloud storage system.
Journal ArticleDOI
Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage
Jiguo Li,Hao Yan,Yichen Zhang +2 more
TL;DR: The technique of certificateless signature is utilized to present a new RDPC protocol for checking the integrity of data shared among a group and the security of the scheme is reduced to the assumptions of computational Diffie-Hellman (CDH) and discrete logarithm (DL).
Journal ArticleDOI
Full Verifiability for Outsourced Decryption in Attribute Based Encryption
TL;DR: An ABE scheme with verifiable outsourced decryption is proposed, which can simultaneously check the correctness for transformed ciphertext for the authorized users and unauthorized users and is proved to be selective CPA-secure in the standard model.
Journal ArticleDOI
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
TL;DR: This paper provides a new efficient RDPC protocol based on homomorphic hash function that is provably secure against forgery attack, replace attack, and replay attack based on a typical security model and gives a new optimized implementation for the ORT, which makes the cost of accessing ORT nearly constant.
Journal ArticleDOI
Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing
TL;DR: A Lightweight Fine-Grained ciphertexts Search (LFGS) system in fog computing is presented by extending Ciphertext-Policy Attribute-Based Encryption and Searchable Encryption technologies, which can achieve fine-grained access control and keyword search simultaneously.
References
More filters
Journal ArticleDOI
Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds
TL;DR: Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user.
Journal ArticleDOI
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Yogachandran Rahulamathavan,Suresh Veluru,Jinguang Han,Fei Li,Muttukrishnan Rajarajan,Rongxing Lu +5 more
TL;DR: A privacy-preserving decentralized key-policy ABE scheme where each authority can issue secret keys to a user independently without knowing anything about his GID, which is the first decentralized ABE scheme with privacy- Preserving based on standard complexity assumptions.
Book ChapterDOI
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
TL;DR: This paper proposes a new multi-authority CP-ABE system which is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe.
Posted Content
Multi-authority attribute based encryption with honest-but-curious central authority.
TL;DR: In this paper, the authors proposed a multi-authority attribute-based encryption scheme, in which only the set of recipients defined by the encrypting party can decrypt a corresponding ciphertext.
Book ChapterDOI
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability
TL;DR: A practical large universe CP-ABE system supporting white-box traceability, which is suitable for commercial applications and proves the selective security of the new system in the standard model under "q-type" assumption.